SlideShare a Scribd company logo
Double SSO & Strong Authentication
For Secure Network Establishment

Project By:-

Internal Guide:-

External Guide:-

Akshaya Kumar Y H M

1BM10CS004

Mrs Nagarathna N

Dr Mohammad Misbahuddin

Aruna S M

1BM10CS010

Associate Professor

Senior Technical Officer, CNIE

Sarthak Gupta

1BM10CS065

CSE,BMSCE

CDAC, Bangalore

1
1. INTRODUCTION
2. LITERATURE REVIEW
3. REQUIREMENTS
4. DESIGN & IMPLIMENTATION
5. SOCIETAL IMPACTS
6. CONCLUSION
7. REFERENCE

2
Requirements
Hardware Requirements

• Application uses Server as one of the major component, we need the
Client machines to connect to the Server and Network setup.

• Processor
• RAM

: Intel i3 or above or equivalent
: 4GB or more

Software Requirements

• Web Server , Service Provider and Client machines with web support.
• Proposed implementation language is C / C++, however we may
occasionally work with certain scripting languages to configure and work
with the Server.
3
INTRODUCTION
SINGLE SIGN-ON SYSTEM (SSO)
Property of access control that enables a user to perform a single
authentication to a service, and then get access to other protected services
without the need to re-authenticate.

DOUBLE SSO
Double SSO is a secure server-side caching-based SSO
architecture and a proxy-based pseudo-SSO system.

4
ADVANTAGES
• With SSO, users' and administrators' lives become much easier as they will
•

•
•
•

have to deal with a single digital identity for each user.
Reduces IT help desk costs, by reducing the number of calls to the help desk
about lost password.
A user will have to provide this digital identity only once per day. This will
increase user's productivity.
The maintenance of authentication data and enforcement of authentication
policies become much easier with SSO, since authentications data will be
centralized.
Reduces the chance that users will forget or lose their digital
identities, therefore it reduces the risk of compromising a security system.
5
Double SSO Features
• User Authorization is separated from Identification Process.
• Asynchronous authorization is achieved.
• Executes a minimum number of computations on the user side and
requires parties to maintain the bare minimum number of keys.

• Provably precludes the Replay Attack, the Man-in-the-Middle Attack and
the Weakest Link Attack. Additionally, it is safe from repudiated parties.

6
Security Analysis
•
•
•
•
•
•

The Weakest Link Attack
Attacks on Security Parameters
Attacks on Identity Proof
The Replay Attack
The Man-in-the-Middle Attack
Repudiation of Parties

7
LITERATURE REVIEW
SSO Categories
• Web SSO : These solutions are for users who access applications using a
web interface.

• Enterprise SSO: These solutions are much broader than web SSO in that
they provide SSO to almost all kinds of applications, not only to webenabled applications.

• Network SSO : These solutions are for users who access applications in a
corporate network domain either through a LAN, or wirelessly, or through
a VPN connection.
8
Available SSO Solutions
•
•
•
•
•

Google SSO Solution
Windows Live ID
Microsoft Office SharePoint Server
Active Directory Federation Service
Liberty SSO Solution

9
Double SSO Components
• Shamir's Identity-Based Signature Scheme

• Zero-Knowledge Identification Protocol
• Simmons' Impersonation-Proof Identity Verification Scheme

10
Shamir's Identity-Based Signature Scheme
• The user uses her/his identity as a public key and asks a trusted Key
Generation Center (KGC) to generate the corresponding private key.

•
•
•
•

KGC generates RSA Public & Private Keys.

KGC issues a Private key to the Sender.
Sender signs on the message using the Private key issued by KGC.
Receiver Verifies the message using Senders’ RSA Public key and Identity.

11
12
Zero-Knowledge Identification Protocol
•
•
•
•

P sends witness ( calculated using random number ) to V
V challenges P with a time-variant challenge

P uses the challenge and secret to compute the response that she sends to V
V uses the response and her challenge to decide whether the response is
correct

• A zero-knowledge protocol must satisfy three properties:
Completeness: Prover is Honest
Soundness: False Prover are not entertained

Zero-knowledge: No Interaction can be Repudiated
13
14
Simmons' Impersonation-Proof Identity Verification
Scheme
• Simmons' scheme relies on an issuer's public authentication channel to
validate a private authentication channel belonging to a user who wants to
prove identity.

• These two channels can be independent and based on two different
authentication algorithms.

• The scheme assumes a trusted issuer whose responsibility is to validate
identification credentials of each user.

15
16
DESIGN & IMPLEMENTATION

17
Identity Provider Setup
1. Identity provider generates RSA public & private key (e,n) & (d,n) where
n=p × q, p & q being two large prime numbers generated according to RSA
algorithm
2. e & n are made public.
3. Identity Provider constructs a secret redundant data block seed.

18
19
User Registering to Identity Provider

20
21
User proving Identity to Identity Provider

22
23
Identity Provider verifies user to Service Provider

24
25
Societal Impact
• Introduction of light weight and secure SSO will help in reducing cost of IT
management.
• Double SSO does not require time synchronization between involved
parties, thus helping novices.
• One Stage in Double SSO can be extracted and used independently as an
Identification Protocol, thus reducing cost of additional identification
algorithm.

26
Conclusion
Lot of theories have been put in to explain and Implement SSO solution for
different platform. It is always seldom confusing to choose which SSO
solution is better. Double SSO considers all such aspect thus resolving the
conflict.

Many currently available SSO solutions involve high operational overhead as
they contain Cryptographic value calculations. Double SSO enhances
efficiency so that additional overhead is removed making it safe and suitable.

27
Work Plan

28
Resources & References
1. Double SSO – A Prudent and Lightweight SSO Scheme Master of Science Thesis in the Programme Secure and
Dependable Computer Systems SARI HAJ HUSSEIN.
Chalmers University of Technology
Department of Computer Science and Engineering , Göteborg, Sweden, November 2010
2. M. Linden and I. Vilpola. An Empirical Study on the Usability of Logout in a Single
Sign-on System. Proceedings of the 1st International Conference on Information
Security Practice and Experience, Singapore, 2005.
3. A. Shamir. Identity-Based Cryptosystem and Signature Scheme. Proceedings ofCRYPTO 84, Santa Barbara,
California, USA, 1984.
4. U. Fiege, A. Fiat and A. Shamir. Zero knowledge proofs of identity. Proceedings of the nineteenth annual ACM symposium
on Theory of computing, New York, USA, 1987.
5. G. J. Simmons. An Impersonation-Proof Identity Verification Scheme. Proceedings of CRYPTO 87, Santa
Barbara, California, USA, 1987.
29
Thank You
Questions ?
30

More Related Content

PPTX
SecureOTP: Total One-Time-Password Solution
PDF
3 reasons your business can't ignore Two-Factor Authentication
PPTX
Two Factor Authentication Made Easy ICWE 2015
PDF
Avoiding Two-factor Authentication? You're Not Alone
PPT
Cartes Asia Dem 2010 V2
PDF
2 factor authentication 3 [compatibility mode]
PDF
Nii sample pt_report
PDF
Two-factor Authentication
SecureOTP: Total One-Time-Password Solution
3 reasons your business can't ignore Two-Factor Authentication
Two Factor Authentication Made Easy ICWE 2015
Avoiding Two-factor Authentication? You're Not Alone
Cartes Asia Dem 2010 V2
2 factor authentication 3 [compatibility mode]
Nii sample pt_report
Two-factor Authentication

What's hot (20)

PDF
Creating OTP with free software
ODP
Pen test methodology
PDF
One-Time Password
PDF
Why Penetration Testing Services Cyber51
PPSX
Welcome to the 3rd generation in user authentication
PPTX
Threshold cryptography
PDF
Cyber securityppt
PPTX
Soho routers: swords and shields CyberCamp 2015
PPT
Netdefender
PDF
Psdot 19 four factor password authentication
PPT
Net Defender
PPTX
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
PPT
Presentation
PDF
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
PDF
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
PPT
PPT
Windows network
PPTX
How to do Cryptography right in Android Part Two
PDF
Protecting Your POS System from PoSeidon and Other Malware Attacks
PPTX
Certificate pinning in android applications
Creating OTP with free software
Pen test methodology
One-Time Password
Why Penetration Testing Services Cyber51
Welcome to the 3rd generation in user authentication
Threshold cryptography
Cyber securityppt
Soho routers: swords and shields CyberCamp 2015
Netdefender
Psdot 19 four factor password authentication
Net Defender
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Presentation
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Windows network
How to do Cryptography right in Android Part Two
Protecting Your POS System from PoSeidon and Other Malware Attacks
Certificate pinning in android applications
Ad

Similar to Single Sign-On & Strong Authentication (20)

PDF
Efficient and Secure Single Sign on Mechanism for Distributed Network
PPTX
Web Single sign on system
PDF
International Journal of Engineering Inventions (IJEI)
PPTX
SINGLE SIGN-ON
DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT Security analysis of a single sign on ...
DOCX
Security analysis of a single sign on mechanism for distributed computer netw...
PPTX
Presentation
PDF
Design and Implementation of Enhanced Single Sign on System for Education Sys...
PDF
Understanding Single Sign-On (SSO): Enhancing User Experience and Security
PPTX
Single salud ocupacional SignOn SSO.pptx
PDF
Advanced mechanism for single sign on for distributed computer networks
PDF
Single Sign On
PDF
Adapting singlet login in distributed systems
PPT
Single sign on and its significance .ppt
PPT
sso_on_new system with security is more concern
PDF
Adapting singlet login in distributed systems
DOCX
Security analysis of a single sign on mechanism for distributed computer netw...
PDF
Cross cloud single sign on (sso) using tokens
PDF
Cross cloud single sign on (sso) using tokens
PPTX
Security operation-center
Efficient and Secure Single Sign on Mechanism for Distributed Network
Web Single sign on system
International Journal of Engineering Inventions (IJEI)
SINGLE SIGN-ON
JAVA 2013 IEEE NETWORKSECURITY PROJECT Security analysis of a single sign on ...
Security analysis of a single sign on mechanism for distributed computer netw...
Presentation
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Understanding Single Sign-On (SSO): Enhancing User Experience and Security
Single salud ocupacional SignOn SSO.pptx
Advanced mechanism for single sign on for distributed computer networks
Single Sign On
Adapting singlet login in distributed systems
Single sign on and its significance .ppt
sso_on_new system with security is more concern
Adapting singlet login in distributed systems
Security analysis of a single sign on mechanism for distributed computer netw...
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
Security operation-center
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

Single Sign-On & Strong Authentication

  • 1. Double SSO & Strong Authentication For Secure Network Establishment Project By:- Internal Guide:- External Guide:- Akshaya Kumar Y H M 1BM10CS004 Mrs Nagarathna N Dr Mohammad Misbahuddin Aruna S M 1BM10CS010 Associate Professor Senior Technical Officer, CNIE Sarthak Gupta 1BM10CS065 CSE,BMSCE CDAC, Bangalore 1
  • 2. 1. INTRODUCTION 2. LITERATURE REVIEW 3. REQUIREMENTS 4. DESIGN & IMPLIMENTATION 5. SOCIETAL IMPACTS 6. CONCLUSION 7. REFERENCE 2
  • 3. Requirements Hardware Requirements • Application uses Server as one of the major component, we need the Client machines to connect to the Server and Network setup. • Processor • RAM : Intel i3 or above or equivalent : 4GB or more Software Requirements • Web Server , Service Provider and Client machines with web support. • Proposed implementation language is C / C++, however we may occasionally work with certain scripting languages to configure and work with the Server. 3
  • 4. INTRODUCTION SINGLE SIGN-ON SYSTEM (SSO) Property of access control that enables a user to perform a single authentication to a service, and then get access to other protected services without the need to re-authenticate. DOUBLE SSO Double SSO is a secure server-side caching-based SSO architecture and a proxy-based pseudo-SSO system. 4
  • 5. ADVANTAGES • With SSO, users' and administrators' lives become much easier as they will • • • • have to deal with a single digital identity for each user. Reduces IT help desk costs, by reducing the number of calls to the help desk about lost password. A user will have to provide this digital identity only once per day. This will increase user's productivity. The maintenance of authentication data and enforcement of authentication policies become much easier with SSO, since authentications data will be centralized. Reduces the chance that users will forget or lose their digital identities, therefore it reduces the risk of compromising a security system. 5
  • 6. Double SSO Features • User Authorization is separated from Identification Process. • Asynchronous authorization is achieved. • Executes a minimum number of computations on the user side and requires parties to maintain the bare minimum number of keys. • Provably precludes the Replay Attack, the Man-in-the-Middle Attack and the Weakest Link Attack. Additionally, it is safe from repudiated parties. 6
  • 7. Security Analysis • • • • • • The Weakest Link Attack Attacks on Security Parameters Attacks on Identity Proof The Replay Attack The Man-in-the-Middle Attack Repudiation of Parties 7
  • 8. LITERATURE REVIEW SSO Categories • Web SSO : These solutions are for users who access applications using a web interface. • Enterprise SSO: These solutions are much broader than web SSO in that they provide SSO to almost all kinds of applications, not only to webenabled applications. • Network SSO : These solutions are for users who access applications in a corporate network domain either through a LAN, or wirelessly, or through a VPN connection. 8
  • 9. Available SSO Solutions • • • • • Google SSO Solution Windows Live ID Microsoft Office SharePoint Server Active Directory Federation Service Liberty SSO Solution 9
  • 10. Double SSO Components • Shamir's Identity-Based Signature Scheme • Zero-Knowledge Identification Protocol • Simmons' Impersonation-Proof Identity Verification Scheme 10
  • 11. Shamir's Identity-Based Signature Scheme • The user uses her/his identity as a public key and asks a trusted Key Generation Center (KGC) to generate the corresponding private key. • • • • KGC generates RSA Public & Private Keys. KGC issues a Private key to the Sender. Sender signs on the message using the Private key issued by KGC. Receiver Verifies the message using Senders’ RSA Public key and Identity. 11
  • 12. 12
  • 13. Zero-Knowledge Identification Protocol • • • • P sends witness ( calculated using random number ) to V V challenges P with a time-variant challenge P uses the challenge and secret to compute the response that she sends to V V uses the response and her challenge to decide whether the response is correct • A zero-knowledge protocol must satisfy three properties: Completeness: Prover is Honest Soundness: False Prover are not entertained Zero-knowledge: No Interaction can be Repudiated 13
  • 14. 14
  • 15. Simmons' Impersonation-Proof Identity Verification Scheme • Simmons' scheme relies on an issuer's public authentication channel to validate a private authentication channel belonging to a user who wants to prove identity. • These two channels can be independent and based on two different authentication algorithms. • The scheme assumes a trusted issuer whose responsibility is to validate identification credentials of each user. 15
  • 16. 16
  • 18. Identity Provider Setup 1. Identity provider generates RSA public & private key (e,n) & (d,n) where n=p × q, p & q being two large prime numbers generated according to RSA algorithm 2. e & n are made public. 3. Identity Provider constructs a secret redundant data block seed. 18
  • 19. 19
  • 20. User Registering to Identity Provider 20
  • 21. 21
  • 22. User proving Identity to Identity Provider 22
  • 23. 23
  • 24. Identity Provider verifies user to Service Provider 24
  • 25. 25
  • 26. Societal Impact • Introduction of light weight and secure SSO will help in reducing cost of IT management. • Double SSO does not require time synchronization between involved parties, thus helping novices. • One Stage in Double SSO can be extracted and used independently as an Identification Protocol, thus reducing cost of additional identification algorithm. 26
  • 27. Conclusion Lot of theories have been put in to explain and Implement SSO solution for different platform. It is always seldom confusing to choose which SSO solution is better. Double SSO considers all such aspect thus resolving the conflict. Many currently available SSO solutions involve high operational overhead as they contain Cryptographic value calculations. Double SSO enhances efficiency so that additional overhead is removed making it safe and suitable. 27
  • 29. Resources & References 1. Double SSO – A Prudent and Lightweight SSO Scheme Master of Science Thesis in the Programme Secure and Dependable Computer Systems SARI HAJ HUSSEIN. Chalmers University of Technology Department of Computer Science and Engineering , Göteborg, Sweden, November 2010 2. M. Linden and I. Vilpola. An Empirical Study on the Usability of Logout in a Single Sign-on System. Proceedings of the 1st International Conference on Information Security Practice and Experience, Singapore, 2005. 3. A. Shamir. Identity-Based Cryptosystem and Signature Scheme. Proceedings ofCRYPTO 84, Santa Barbara, California, USA, 1984. 4. U. Fiege, A. Fiat and A. Shamir. Zero knowledge proofs of identity. Proceedings of the nineteenth annual ACM symposium on Theory of computing, New York, USA, 1987. 5. G. J. Simmons. An Impersonation-Proof Identity Verification Scheme. Proceedings of CRYPTO 87, Santa Barbara, California, USA, 1987. 29